Download the latest version of software you need for free

Advertising


  • Web
  • Download Free PC Software
  • Showing posts with label Security. Show all posts
    Showing posts with label Security. Show all posts

    GridinSoft Trojan Killer 2.1.2.2

    GridinSoft Trojan Killer 2.1.2.2

     

    GridinSoft Trojan Killer 2.1.2.2 | 29 MB

    Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners.

    Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware.

    Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control on your computer as soon as possible and do not allow anyone to use your data.


    Dr.Web Anti-virus & Security Space 7.0.1.04061

    Dr.Web Anti-virus & Security Space 7.0.1.04061

     Dr.Web Anti-virus & Security Space 7.0.1.04061 Multilingual | 115.4/150.4 Mb


    Dr.Web® for Windows provides reliable and highly efficient protection of your system and data regardless what type of the Microsoft operating system is installed on your computer. The Dr.Web® for Windows components allow in a real time mode to detect malicious programs from any external sources.

    Dr.Web Anti-virus features:
    - Best at curing active infections
    - Installs in an infected system without its preliminary curing
    - Fast multi-thread scanning
    - Unique technologies blocking even unknown threats
    - Full scan of archives at all nesting levels
    - Best detection and neutralization of complex viruses
    - Full scan of archives at all nesting levels
    - Protects against unauthorized access by a network; prevents data leaks; blocks suspicious connections on package and application layers

    Dr.Web Security Space features:
    - Comprehensive anti-virus solution for PC
    - Real time protection
    - Best at curing active infections
    - Installs in an infected system without its preliminary curing
    - Fast multi-thread scanning
    - Unique technologies blocking even unknown threats
    - Full scan of archives at all nesting levels
    - Best detection and neutralization of complex viruses
    - Filters spam and other types of unsolicited messages without training the anti-spam
    - Reliable on-the-fly scan of inbound and outbound http-traffic
    - Efficient protection of children against exposure to objectionable content
    - Protects against unauthorized access by a network; prevents data leaks; blocks suspicious connections on package and application layers
    - Remote administration from other computers in the local network without installing the Dr.Web Control Center.

    Malwarebytes' Anti-Malware 1.61.0.1400

    Malwarebytes' Anti-Malware 1.61.0.1400

     Malwarebytes' Anti-Malware 1.61.0.1400 Multilanguage | 10 MB


    Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start.Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start.

    The Realtime Protection Module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats. Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. We compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well-known Anti-Virus and Anti-Malware applications on the market today cannot.

    Key Features:
    * Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
    * Light speed quick scanning.
    * Ability to perform full scans for all drives.
    * Malwarebytes' Anti-Malware Protection Module. (requires registration)
    * Database updates released daily.
    * Quarantine to hold threats and restore them at your convenience.
    * Ignore list for both the scanner and Protection Module.
    * Settings to enhance your Malwarebytes' Anti-Malware performance.
    * A small list of extra utilities to help remove malware manually.
    * Multi-lingual support.
    * Works together with other anti-malware utilities.
    * Command line support for quick scanning.
    * Context menu integration to scan files on demand.

    PC Tools Internet Security 2012 v9.0.0.912

    PC Tools Internet Security 2012 v9.0.0.912

     

    PC Tools Internet Security 2012 v9.0.0.912 Multilanguage | 59 Mb

    All-in-one Security featuring Editor's Choice Anti-Spyware, AntiVirus, Firewall and Spam protection. PC Tools Internet Security is a comprehensive security suite that offers complete protection to your computer by combining PC Tools' award winning Anti-Spyware, Anti-Virus, Anti-Spam and Firewall protection into an all-in-one, easy-to-use product.

    PC Tools Internet Security includes Spyware Doctor with AntiVirus, the most awarded antispyware protection worldwide. Spyware Doctor with AntiVirus has been downloaded over 160 million times, with a million more downloads each week. Spyware Doctor with AntiVirus will protect your PC from spyware, adware, Trojans, keylogers, phishing attacks and other malicious online threats using proactive, reactive and automated protection to stop threats at every entry point. The advanced protection of Spyware Doctor with AntiVirus, when combined with spam protection and advanced firewall, will securely connect you to your online world.

    Spyware Doctor with AntiVirus has consistently been awarded Editors' Choice and Best of the Year awards by leading PC magazines and testing laboratories around the world, including the United States, United Kingdom, Sweden, Germany and Australia. Spyware Doctor continues to be awarded the highest accolades by many of the world's leading PC publications such as PC Magazine, PC World, PC Pro, PC Plus, PC Authority, PC Utilities, PC Advisor, PC Utilities, Computerbild, PC Welt, and PC Answers Magazine.

    Jetico BestCrypt 8.23.7

    Jetico BestCrypt 8.23.7

     

    Jetico BestCrypt 8.23.7 | 15.8 Mb

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
    BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.

    BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
    BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).

    The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

    Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. As well, with BestCrypt v.8 you can mount file-container as a subfolder on NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk.

    BoxCryptor v1.2.0.2

    BoxCryptor v1.2.0.2

    BoxCryptor v1.2.0.2 | 3.2 MB


    BoxCryptor encrypts your files using the AES-256 standard. This makes your data secure - no matter which cloud storage provider you use. Access your encrypted files on all devices. We have BoxCryptor for Windows, Android and iOS - and even support Mac OS X and Linux. Encrypt your files the quick and easy way. Each file is encrypted individually in real-time and stored in a folder of your choice, e.g. your Dropbox folder.

    You want to use cloud storage and access your data from everywhere but you do not want to worry about data security or give up comfort? Then BoxCryptor is the perfect software for you. It has never been easier and more user-friendly to encrypt your data without losing the advantages of cloud storage.

    Keep your files always with you

    With BoxCryptor you can easily access your encrypted files – on your computer, smartphone or tablet. Want to add new files to your Dropbox while on the go? With BoxCryptor for iOS and Android you can upload files anytime without having to worry about security.

    Security using highest standards

    You want to store highly sensitive files in the cloud? Your contracts, your bank details or your dissertation? BoxCryptor uses the AES-256 standard to encrypt and protect your files. AES-256 is classified by the U.S. Government to protect “TOP SECRET” information. To add an additional security layer, BoxCryptor also uses filename encryption.

    Windows Password & Key Finder v6.0.1.3

    Windows Password & Key Finder v6.0.1.3

    Windows Password & Key Finder v6.0.1.3 | 5.9 Mb

     
    With just one click, you can recover your email password including hotmail, Yahoo, Gmail, AOL mail and more; recover messenger password including MSN, Yahoo Messenger, Google Talk; recover Outlook password , Access password; recover IE AutoComplete password, dialup and DSL connection password and more.

    Find and display product key for any Windows and Microsoft Office software products. Even find out your Windows system CD Key when your Windows can't startup.


    Support all Microsoft Office including Office 97, 2000, XP, 2003, 2007, 2010.


    Support all Windows including Windows 95, 98, 2000, 2003, XP, Vista, Windows 7, NT and Me. Support 32-bit and 64-bit.


    100% recovery rate guaranteed!

    WinPatrol 2012 PLUS 24.3.2012.0

    WinPatrol 2012 PLUS 24.3.2012.0


    WinPatrol 2012 PLUS 24.3.2012.0 | 1.05 Mb

    WinPatrol allows you to control the installation of malicious programs on your computer. The program monitors important system areas (area load, system folders, register), which usually vary malicious programs. Through the program, you can stop the process and disable / enable starup program. The program also allows you to control cookies, delete them based on keyword. WinPatrol monitors and deletes the operating system, various modules and malicious spyware programs such as Adware and Spyware, finds and neutralize some types of viruses, Trojans, viruses, and auto programs that threaten the confidentiality of computerized information. WinPatrol monitors changes in the browser and does not allow the installation of the various bars and spyware modules. Of course, it does not protect your computer is completely different from the attack, but a good complement to secure antivirus and firewall redirector.

    WinPatrol uses a heuristic approach to detecting attacks and violations of your computing environment. Traditional security programs scan your hard drive searching for previously identified threats. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. You'll be removing dangerous new programs while others download new reference files.


    Malwarebytes' Anti-Malware 1.51.2.1300 + Portable

    Malwarebytes' Anti-Malware 1.51.2.1300 + Portable

    Malwarebytes' Anti-Malware 1.51.2.1300 Final Portable Multilanguage | 9.3 MB


    Malwarebytes' Anti-Malware is an anti-malware application that can thoroughly remove even the most advanced malware. It includes a number of features, including a built in protection monitor that blocks malicious processes before they even start.Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start.

    The Realtime Protection Module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats. Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. We compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well-known Anti-Virus and Anti-Malware applications on the market today cannot.

    Key Features:
    * Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
    * Light speed quick scanning.
    * Ability to perform full scans for all drives.
    * Malwarebytes' Anti-Malware Protection Module. (requires registration)
    * Database updates released daily.
    * Quarantine to hold threats and restore them at your convenience.
    * Ignore list for both the scanner and Protection Module.
    * Settings to enhance your Malwarebytes' Anti-Malware performance.
    * A small list of extra utilities to help remove malware manually.
    * Multi-lingual support.
    * Works together with other anti-malware utilities.
    * Command line support for quick scanning.
    * Context menu integration to scan files on demand.

    OS : Win XP/2000/Vista/Win 7
    Language : Multilanguage

    ESET NOD32 Antivirus & Smart Security 5.0.93.0 Final

    ESET NOD32 Antivirus & Smart Security 5.0.93.0 Final

    ESET NOD32 Antivirus & Smart Security 5.0.93.0 Final (x86/x64) | 50.3/54.7/55.6/60.8 MB


    ESET Smart Security is a tightly integrated solution designed to protect computers from a range of threats. Built on the award-winning ESET NOD32® Antivirus and its powerful ThreatSense® engine, ESET Smart Security provides antispyware, antispam and customized firewall features. Utilizing ThreatSense — the industry's most advanced heuristics — the window of vulnerability between virus outbreak and signature update is reduced.

    The key advantage of this approach is that individual protection modules are able to communicate together seamlessly, to create unparalleled synergy to improve the efficiency and effectiveness of protection. Moreover, the integrated architecture guarantees optimal utilization of system resources, so ESET Smart Security continues ESET's well know reputation for providing rock solid security in a small footprint that will not slow down an individual's computer.

    ESET Smart Security provides:
    * Proactive Protection: award winning ThreatSense technology combines multiple layers of detection protecting you from Internet threats before it is too late. The included antispam and personal firewall features provide you with a total security solution.
    * Precise Detection: ESET accurately identifies known and unknown threats. It consistently wins top awards from testing labs and is recognized for having zero false positives.
    * Lightweight Design: Smart Security requires less memory and CPU power, allowing your computer to run fast, making more room for games, web browsing, and emailing.
    * Fast Scanning Speeds: ESET Smart Security is a highly efficient program ensuring fast file scanning and product updates, while running quietly in the background.

    ESET Smart Security is a new product designed to provide comprehensive protection against a variety of threats. It features the following:
    • The next version of ESET's anti-malware engine with comprehensive protection against adware, rootkits, spyware, Trojan horses, viruses, worms and other types of malicious software
    • A personal firewall with port stealthing and advanced filtering features
    • An antispam filter with Bayesian filtering, whitelisting and blacklisting.

    ESET NOD32 Antivirus + Antispyware
    • This component is in fact an improved version of the award-winning scanning engine of NOD32 Antivirus v2.7. With respect to program's unprecedented scanning speed, the following improvements have been made:
    • Improved system of cleaning and deleting infiltrations. The antivirus system now intelligently cleans and deletes infiltrations with no need for user interaction.
    • Computer scan can be run in background in order to use only a part of system resources. Thus scanning will not affect the
    performance of your computer and you will be able to work on it as usual.
    • The resident protection supports archive scanning.
    • Update optimization, smaller update package size than in version 2.7, more effective management and protection of update files against damage.
    • Email protection for users of Outlook Express.

    ESET Personal Firewall
    • Firewall monitors all traffic between a protected computer and other computers in the local network and in the Internet. High quality protection is provided by the following functions:
    • Scanning of application protocols HTTP and POP3 (used for Internet browsing and for retrieving email from servers) for infiltrations.
    • Checking low-level network communication which helps to avoid many of various remote attacks.
    • Ability to recognize the character of network connections established by various types of infiltrations and ability to automatically terminate them.
    • Filtering of incoming and outgoing communication based on user defined rules.
    • Monitoring changes in executable files.
    • Interactive and automatic mode. The former enables you to create your own filtering rules, the latter filters all communication automatically.

    ESET Anti Spam
    • ESET Anti Spam serves to filter unsolicited email, which makes your work with email more effective. The key features of the ESET Anti Spam are:
    • Support for the RCF email format
    • Supports several scanning techniques including the combination of Bayesian filter, virus signatures and user defined rules.
    • Supports the creation of Blacklist and Whitelist.
    • Integration with the Microsoft Outlook messaging and collaboration client.
    • Ability to control multiple messages simultaneously.

    Dr.Web Anti-virus & Security Space Pro 6.00.1.09090 Final

    Dr.Web Anti-virus & Security Space Pro 6.00.1.09090 Final

    Dr.Web Anti-virus & Security Space Pro 6.00.1.09090 Final Multilanguage (x86/x64) | 107/153 MB


    Dr.Web® for Windows provides reliable and highly efficient protection of your system and data regardless what type of the Microsoft operating system is installed on your computer. The Dr.Web® for Windows components allow in a real time mode to detect malicious programs from any external sources.

    Key functions:
    • Improved! Detection and neutralization of malware on hard drives, removable data storage devices and in RAM
    • Real-time interception of all calls to files on CD/DVD/ Blue –ray/Flash-drives and smart cards
    • Improved! Detection of viruses using rootkit technologies
    • Improved! Protection against unknown threats powered by non-signature detection technology Origins Tracing™ and the intelligent heuristic analyzer
    • Improved! Detection of viruses placed in an archive at any nesting level
    • New! The FLY-CODE technology allows checking files compressed by unknown packers
    • Virus scan of SMTP/POP3/NNTP/IMAP traffic
    • Protection against mass mailings performed by a mail worm from an infected machine
    • Filtering on-the-fly of spam, scams, bounces, phishing and pharming messages.
    • New! Real-time scan of web-pages ensuring that a user receives only clean web-content
    • New! Block of access to phishing sites and other fraudulent web-resources
    • New! Protection against unwanted content
    • New! Block of access to web-sites based on 10 categories
    • New! Block of access to movable media, network devices , files and folders on hard drives which protects from destroying or stealing of vital data
    • New! Protection against cyber crime targeting children
    • Protection against annoying Internet ads
    • Protection of account information related to online games, social networks, electronic money systems, credit card numbers and PIN codes
    • Detection of spam-bots
    • On demand/scheduled scan
    • Automatic updating

    McAfee Encrypted USB 1.5.1 EPO Extension

    McAfee Encrypted USB 1.5.1 EPO Extension

    McAfee Encrypted USB 1.5.1 EPO Extension | 328 MB


    USB devices are widely used and convenient because of their small size, huge storage capacity, and high portability. However, with convenience comes risk. These devices, along with the confidential data they contain, are easily lost or stolen. To make the data on these devices unreadable by unauthorized parties, McAfee offers Encrypted USB drives to keep mobile data secure with strong encryption and an advanced management platform.

    Automatic encryption X Encrypt data transparently, automatically, and on the fly, with no special training required.

    Industry-leading technology X Protect sensitive information with AES-256 encryption and FIPS-140-2 validation. With hardware-based encryption, encryption keys cant be obtained or copied because they never leave the USB drive.

    Advanced management platform X Extend company security policies and compliance requirements to mobile USB drives in a strategic, comprehensive, and managed way. With the McAfee ePolicy Orchestrator (ePO) platform, companies can centralize deployment, management, policy administration, monitoring, reporting, and auditing.

    Compliance ready X Extensive auditing capabilities and reporting tools allow companies to prove that data on devices were encrypted, even if a device is lost or stolen.

    Spy Emergency 9.0.805.0

    Spy Emergency 9.0.805.0

     

    Spy Emergency 9.0.805.0 Multilanguage | 16.6 Mb

    Spy Emergency is the anti spyware, anti malware, anti spam solution that fast and secure removes spyware, malware, spam and other internet threats from your computer. Spy Emergency protects you against thousands of various infections and potencially unwanted software, including spyware, adware, spam, virus, trojans, worms, homepage hijackers, remote administration tools, activex components, dialers, scumware, keyloggers, data mining software, toolbars, tracking cookies, browser, hijackers/BHO's.

    Spy Emergency do not slow down your computer and still protects you while your are working not like others spyware removal software. Spy Emergency has more than 985,000 threat definitions in its signature database! Small and regular definition updates greatly reduce update downloading time. Spy Emergency is ready to fight malware on Windows Vista operating systems.

    Spy Emergency Features:
    • Support for Internet Explorer, Mozilla Firefox and Opera browsers
    • Scan of your system memory
    • Scan of your registry
    • Scan of your storage
    • Built-in anti-spam
    • System directory storage scan
    • Tracking cookies scan
    • Host file scan
    • Hijackers scan
    • Heuristic malware detection
    • Polymorhic malware detection
    • Generic unpacker with support for UPX, Aspack
    • Command line interface
    • Automatic LSP stack repair
    • Real-time memory shields that blocks spyware before it executes
    • Prevention shields that blocks malware installation
    • Browser shields, including homepage shield
    • Tracking cookies shields
    • Automatic database updates
    • News updates
    • Individual spy restore functionality
    • Keeplist
    • Scheduling support
    • Simple configuration
    • Intuitive and clear user interface for spyware removal
    • Handy Shell Extension Scanning
    • Skin support
    • Language support
    • Premium Technical support
    • and much more...

    Kryptel Enterprise Edition 6.1.4

    Kryptel Enterprise Edition 6.1.4




    Kryptel Enterprise Edition 6.1.4 | 13 Mb

    You have sensitive data to protect? There is only one reliable way – encryption, and it is not as hard as you might think. If you are looking for quality encryption software, which you could use without being a crypto expert, then Kryptel is what you need. Kryptel is available in several editions to fit every possible requirement and budget – from free Kryptelite to advanced Enterprise Edition.
    Easy File and Folder Encryption
    Encryption may be a complex thing, but you don’t need to be a rocket scientist to use it. Just right-click a file or a folder and select ‘Encrypt’ – or drag it to the Kryptel desktop icon.

    Kryptel produces not just an “encrypted file”; its files are containers that may contain thousand of files and folders. Sometimes you might want to decrypt a few files only, or just peek inside. Kryptel Browser is an Explorer-like tool, which lets you easily browse or modify a Kryptel container and view the files it contains.
    Failure Resistant

    Nobody encrypts useless data, and Kryptel makes every possible effort to ensure the important user files are safe. Even if the computer crashes in the middle of encryption step, no data will be lost. To make encryption even more reliable, Kryptel performs a verification step after every operation to guarantee that the just created encrypted container can be successfully decrypted.
    And if an encrypted container becomes corrupted due to hardware failure, Kryptel Data Recovery gives you a good chance to get your data back. 

    Norton Internet Security 2012 19.1.0.28

    Norton Internet Security 2012 19.1.0.28




    Norton Internet Security 2012 19.1.0.28 | 107.7 MB

    Norton Internet Security 2012 - fast and powerful protection against malware and online threats without slowing down your computer. Options antivirus, antispyware, firewall supplemented unique technologies to effectively protect your computer from all types of Internet threats. Allows for quick and easy protection without slowing system performance. The function of early warning of performance will notify you if other applications slow down or affect the performance of your computer. Protect your personal information online, so you can be sure that you become a victim of cyber fraud.

    Norton 2012 contain a feature Insight 3.0, the latest version of the exclusive technology evaluates the Norton, which changes the approach of users to install new software. Insight scans every downloaded fakyl safety before allowing him to run this year, this technology also has learned to provide users with additional information about possible problems with the stability of a software before installing it. Users can rely on this additional information to decide whether to install this application, or better to look different, but the same sound, but more stable. The beta version also includes an updated behavioral protection SONAR 4.0, which monitors the running applications on suspicious behavior to quickly identify and disable the previously unknown threats.

    Identity Safe Technology 2012 supports your data in a safe cloud Norton. You can also configure this feature and use it on multiple computers. The online profile is created using an important current account Norton.

    History Sweeper 3.27 + Rus


    History Sweeper 3.27 + Rus



    History Sweeper 3.27 + Rus | 0.42 MB

    Did you know that Windows maintains an “unseen” history of all of your PC activities, including files you have opened, websites visited, e-mails sent, logins and passwords, etc? It is important to understand that even having taken steps to “delete” files, cookies, search terms, browser history, etc., your data and activity remains on your PC “unseen. This leaves a history of all of your PC activity available to anyone who may currently have or someday gain access to your computer, be it family, employer, colleague, legal, PC maintenance, shared network, wireless network, or hacker sources. In addition, when you are on the Internet, you may have downloaded intrusive devices such as cookies, bugs, and spyware onto your computer. The intrusive devices may strike at any time. These problems raise not just privacy concerns but serious security issues as well.

    ACT NOW! PROTECT YOUR PC PRIVACY 
    To truly erase this information off of the hard drive requires a deeper professional “cleaning” of your computer that is provided by History Sweeper software. History Sweeper is very simple and quick to use, and can provide you with the peace-of-mind of knowing that your personal activity and information will remain private and protected.

    USE REGULARLY TO IMPROVE SYSTEM PERFORMANCE 
    By maintaining this history of all your PC activity and “deleted” files, the performance of your PC is impacted with less efficient use of the disk space and disk mapping. History Sweeper serves as a very beneficial general PC maintenance program, saving storage space, allowing more efficient mapping, and improving the performance of your PC in the process.

    Firewall Builder 5.0.0.3568

    Firewall Builder 5.0.0.3568





    Firewall Builder 5.0.0.3568 (Windows/MacOSX) | 21.6/22.5 Mb

    Firewall Builder is multi-platform firewall configuration and management tool. It consists of a GUI and set of policy compilers for various firewall platforms. Firewall Builder uses object-oriented approach, it helps administrator maintain a database of network objects and allows policy editing using simple drag-and-drop operations. Firewall Builder currently supports iptables, ipfilter, OpenBSD PF as well as Cisco PIX and Cisco IOS extended access lists. Being truly vendor-neutral, Firewall Builder can generate configuration file for any supported target firewall platform from the same policy created in its GUI. This provides for both consistent policy management solution for heterogeneous environments and possible migration path.

    Policy compiler for PIX, which recently has been released under GPL, allows Firewall Builder to function as a sophisticated policy management software for Cisco PIX firewall with access to all functions of PIX including newest features added in v7.x. Policy compiler for Cisco IOS Access Lists adds support for router access lists and turns Firewall Builder into complete solution for the multi-tiered network security. Firewall Builder allows for management of multiple firewalls using the same network object database. Change made to an object is immediately reflected in the policy of all firewalls using this object. Administrator only needs to recompile and install policies on actual firewall machines.

    Jetico BestCrypt 8.23.1


    Jetico BestCrypt 8.23.1



    Jetico BestCrypt 8.23.1 | 15.04 Mb

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    The BestCrypt Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available. BestCrypt’s data encryption method uses encryption algorithms known world-wide and provides unparalleled protection against unauthorized data access. BestCrypt is easy to install, easy to use and totally transparent for application programs. Your data is BestCrypt’s only concern, and it enhances your basic right to keep documents, commercial proprietary knowledge, and private information, in a confidential fashion.

    Once written to a BestCrypt file (container), data is never stored in an ‘open’ condition. Yet BestCrypt’s smooth operation and complete transparency allow any authorized user to get instant access to the data.
    BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input, and transparent encryption.

    BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
    BestCrypt allows encrypting data with many encryption algorithms (AES, Blowfish, Twofish, CAST and others). Every algorithm is implemented with the largest possible key size defined in the algorithm's specification. BestCrypt v.8 can utilize LRW Encryption Mode, which is specially designed for applications working on disk sector level and more secure than other popular modes used earlier (like Cipher Block Chaining (CBC) mode).

    The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

    ID USB Lock Key v3.5


    ID USB Lock Key v3.5



    ID USB Lock Key v3.5 | 1.86 Mb

    ID USB Lock Key is a PC USB lock security application meant to protect your computer from unauthorized users. It denies access, by providing a security block-screen which can be unblocked with the USB stick where you have the key generated by the program.

    ID USB Lock Key Main Features:
    Generates a protection-key for each USB stick
    Blocks PC by simply pressing CTR+ALT+L
    Activates a block-screen after locking the PC
    Denies access to unauthorized users
    Preserves block-status even after reboot



    Detailed features:

    ID USB Lock Key is a high performance PC blocking program, password securing your computer against outside unauthorized access by the use of an USB stick.

    Activates the block screen by just three steps. All you have to do, in order to have your PC protected, is to introduce your USB stick, generate a security private key and unplug the USB. Your computer then blocks any unauthorized access.

    Locks your computer by itself when your status becomes IDLE. You can choose to activate the blocking-mode by simply pressing CTR+ALT+L.

    ID USB Lock Key protects thoroughly by not allowing access not even after a reboot of your computer. It makes sure that your PC doesn’t reboot to its original unblocked status.

    Generates a unique protection key for one or more USB sticks. In case you loose your USB stick, or you want to allow access to another user on his/her private USB stick, the program will generate another unique key.

    Displays a lock screen. ID USB Lock Key displays a protection screen whenever someone else touches your computer, disabling any key from having any influence upon it.

    ID USB Lock Key has a convenient graphic interface which is very simple to use. It requires minimal space on your computer to operate efficiently.


    MacScan 2.9.1


    MacScan 2.9.1





    MacScan 2.9.1 | Mac Os X | 8.5 MB

    Protect your security and privacy with MacScan, the premier Anti-Spyware program for Mac OS X. Detect, isolate, and remove spyware as well as clean up Internet clutter. With MacScan’s Blacklisted Cookie Scan you can remove blacklisted tracking cookies without losing all your saved usernames and passwords. Keep up to date with the latest Spyware definition updates!

    Since early 2002, SecureMac has been developing its proprietary anti-spyware application, MacScan. January 2006 saw the release of MacScan for OS X at MacWorld San Francisco. But in 2007, the MacScan team upped the ante at Macworld SF by releasing MacScan 2 with key features such as frequent definition updates and then for cookies on their Cookie Blacklist. Users can now remove over 8000 known cookies for adware and malware with a single click and without losing any of their saved cookies. The Cookie Blacklist definitions, like the Spyware definitions, come in easy to download updates.

    Key Features

    Anti-Spyware Protection - Detects, isolates and removes spyware with free definition updates.
    Detects over 8500 blacklisted cookies - Protect your Internet privacy by deleting tracking cookies without losing personal data such as passwords.
    Cleanup Internet Clutter - Manage your Internet clutter offering quick deletion of history files for multiple web browsers.
    Non-intrusive performance - Allows the user to run MacScan only when wanted not hogging system resources slowing down the users experience
    Schedule Scans - Setup Scans to run at specific days and times.

    System Requirements
    10.2.4 or higher